d-collapsibility is NP-complete for d 4

Size: px
Start display at page:

Download "d-collapsibility is NP-complete for d 4"

Transcription

1 d-collapsibility is NP-complete for d 4 Martin Tancer June 22, 2010 Abstract A simplicial complex is d-collapsible if it can be reduced to an empty complex by repeatedly removing (collapsing) a face of dimension at most d 1 that is contained in a unique maximal face. We prove that the algorithmic question whether a given simplicial complex is d-collapsible is NP-complete for d 4 and polynomial time solvable for d 2. As an intermediate step, we prove that d-collapsibility can be recognized by the greedy algorithm for d 2, but the greedy algorithm does not work for d 3. A simplicial complex is d-representable if it is the nerve of a collection of convex sets in R d. The main motivation for studying d-collapsible complexes is that every d-representable complex is d-collapsible. We also observe that known results imply that d-representability is NP-hard to decide for d 2. 1 Introduction Our task is to determine the computational complexity of recognition of d- collapsible simplicial complexes. These complexes were introduced by Wegner [Weg75] and studying them is motivated by Helly-type theorems, which we will discuss later. All the simplicial complexes 1 throughout the article are assumed to be finite. Department of Applied Mathematics and Institute for Theoretical Computer Science (supported by project 1M0545 of The Ministry of Education of the Czech Republic), Faculty of Mathematics and Physics, Charles University, Malostranské nám. 25, Prague, Czech Republic. Partially supported by project GAUK tancer@kam.mff.cuni.cz 1 We assume that the reader is familiar with simplicial complexes; introductory chapters of books like [Mat03, Hat01, Mun84] should provide a sufficient background. Unless stated otherwise, we work with abstract simplicial complexes, i.e., set systems K such that if A K and B A then B K. 1

2 1.1 Main results d-collapsible complexes. Informally, a simplicial complex is d-collapsible if it can be vanished by removing faces of dimension at most d 1 which are contained in unique maximal faces. A more detailed motivation for this definition is explained after introducing d-representable complexes. Next we introduce some notation and state a precise definition. A face σ of a simplicial complex K is collapsible if there is a unique maximal face of K containing σ (by maximal face we always mean inclusionwisemaximal face ). Unless stated otherwise, we denote this maximal face by τ(σ). (We allow τ(σ) = σ.) Moreover, if dimσ d 1, then σ is d-collapsible. By [σ,τ(σ)] we denote the set {η K σ η τ(σ)} of faces of K that contain σ. We assume that σ is d-collapsible and we say that the complex K = K\[σ,τ(σ)] arises from K by an elementary d-collapse. In symbols, K K. If we want to stress σ we write K = K σ. A complex K d-collapses to a complex L, in symbols K L, if there is a sequence of elementary d-collapses K K 2 K 3 L. This sequence is called a d-collapsing (of K to L). Finally, a complex K is d- collapsible if K. An example of 2-collapsible complex is in Figure 1. The computational complexity of d-collapsibility. How hard is it to decide whether a given simplicial complex is d-collapsible? We consider the computational complexity of this question (the size of an input is the number of faces of the complex in the question), regarding d as a fixed integer; we refer to it as d-collapsibility. According to Lekkerkerker and Boland [LB62] (see also [Weg75]), 1-collapsible complexes are exactly clique complexes over chordal graphs. (A graph is chordal if it does not contain an induced cycle of size 4 or more.) 1-COLLAPSIBILITY is therefore polynomial time solvable. (Polynomiality of 1-COLLAPSIBILITY also follows from Theorem 1.2(i).) The main result of this paper is the following: Theorem 1.1. (i) 2-COLLAPSIBILITY is polynomial time solvable. 2

3 σ= {2,4} τ(σ)={2,4} 2 3 σ= {1,2} τ(σ)={1,2,3} 2 3 σ= {2} τ(σ)={2,3} 3 σ= {1,3} τ(σ)={1,3} σ= {3} τ(σ)={3,4} 4 1 σ= τ(σ)={1,4} Figure 1: An example of 2-collapsing. (ii) d-collapsibility is NP-complete for d 4. Suppose that d is fixed. A good face is a d-collapsible face of K such that K σ is d-collapsible; a bad face is a d-collapsible face of K such that K σ is not d-collapsible. Now suppose that K is a d-collapsible complex. It is not immediately clear whether we can choose elementary d-collapses greedily in any order to d-collapse K, or whether there is a bad sequence of d-collapses such that the resulting complex is no longer d-collapsible. Therefore, we consider the following question: For which d there is a d-collapsible complex K such that it contains a bad face? The answer is: Theorem 1.2. (i) Let d 2. Then every d-collapsible face of a d-collapsible complex is good. (ii) Let d 3. Then there exists a d-collapsible complex containing a bad d- collapsible face. Theorem 1.1(i) is a straightforward consequence of Theorem 1.2(i). Indeed, if we want to test whether a given complex is 2-collapsible, it is sufficient to greedily collapse d-collapsible faces. Theorem 1.2(i) implies that we finish with an empty complex if and only if the original complex is 2-collapsible. Our construction for Theorem 1.2(ii) is an intermediate step to proving Theorem 1.1(ii). 3

4 1.2 Motivation and background d-representable complexes. Helly s theorem [Hel23] asserts that if C 1,C 2,...,C n are convex sets in R d, n d + 1, and every d + 1 of them have a common point, then C 1 C 2 C n. This theorem (and several other theorems in discrete geometry) deals with intersection patterns of convex sets in R d. It can be restated using the notion of d-representable complexes, which record the intersection patterns. The nerve of a family S = {S 1,S 2,...,S n } of sets is the simplicial complex with vertex set [n] = {1, 2,...,n} and with the set σ [n] forming a face if i σ S i. A simplicial complex is d-representable if it is isomorphic to the nerve of a family of convex sets in R d. In this language, Helly theorem states that if a d-representable complex (with the vertex set V ) contains all faces of dimension at most d, then it is already a full simplex 2 V. Beside Helly s theorem we also mention several other known results that can be formulated using d-representability. They include the fractional Helly theorem of Katchalski and Liu [KL79], the colorful Helly theorem of Lovász ([Lov74]; see also [Bár82]), the (p, q)-theorem of Alon and Kleitman [AK92], and the Helly type result of Amenta [Ame96]. d-leray complexes. Another related notion is a d-leray simplicial complex, where K is d-leray if every induced subcomplex of K (i.e. a subcomplex of the form K[X] = {σ X σ K} for some subset X of the vertex set of K) has zero homology (over Q) in dimensions d and larger. We will mention d-leray complexes only briefly, thus the article should be accessible also for the reader not familiar with homology. Relations among the preceding notions. Wegner [Weg75] proved that d- representable complexes are d-collapsible and also that d-collapsible complexes are d-leray. Regarding the first inclusion, suppose that we are given convex sets in R d representing a d-representable complex. Sliding a generic hyperplane (say from infinity to minus infinity) and cutting off the pieces on the positive side of the hyperplane yields a d-collapsing of the complex. (Several properties have to be checked, of course.) This is the main motivation for the definition of d-collapsibility. The second inclusion is more-less trivial (for a reader familiar with homology) since d-collapsing does not affect homology of dimension d and larger. Many results on d-representable complexes can be generalized in terms of d-collapsible complexes, the results mentioned here even for d-leray complexes. For example, a topological generalization of Helly s theorem follows from Helly s own work [Hel30], a generalization of the fractional Helly theorem and (p, q)-theorem was done in [AKMM02], and a generalization of the colorful Helly theorem and Amenta s theorem was proved by Kalai and Meshulam [KM05], [KM08]. 4

5 Dimensional gaps between collapsibility and representability were studied by Matoušek and the author [MT09, Tan10b]; an interesting variation on d- collapsibility was used by Matoušek in order to show that it is not easy to remove degeneracy in LP-type problems [Mat09]. Related complexity results. Similarly as d-collapsibility, we can also consider the computational complexity of d-representability and d-le- RAY COMPLEX. By a modification of a result of Kratochvíl and Matoušek on string graphs ([KM89]; see also [Kra91]), one has that 2-REPRESENTABILITY is NP-hard. Moreover, this result also implies that d-representability is NP-hard for d 2. Details are given in Section 6. It is not known to the author whether d-representability belongs to NP. Finally, d-leray COMPLEX is polynomial time solvable, since an equivalent characterization of d-leray complexes is that it is sufficient to test whether the homology (of dimension greater or equal to d) of links 2 of faces of the complex in the question vanishes. These tests can be performed in a polynomial time; see [Mun84] (note that the k-th homology of a complex of dimension less than k is always zero; note also that the homology is over Q, which simplifies the situation computing homology for this case is indeed only a linear algebra). Among the above mentioned notions, d-representability is of the biggest interest since it straightly affects intersection patterns of convex sets. However, NP-hardness of this problem raises the question, whether it can be replaced with d-collapsibility or d-leray COMPLEX. As we have already mentioned, d-leray COMPLEX is polynomial time solvable thus one could be satisfied with replacing d-representability with d-leray COMPLEX. However, d-collapsibility is closer to d-representability. One of the important differences regards Wegner s conjecture. An open set in R d homeomorphic to an open ball is a d-cell. A good cover in R d is a collection of d-cells such that an intersection of any subcollection is again a d-cell or empty. Wegner conjectured that nerve of a finite good cover in R d is d-collapsible. A recent result of the author disproves this conjecture [Tan10a]. However, the nerve of a finite good cover in R d is always d-leray due to the nerve theorem; see, e.g, [Bjö95, Bor48]. We get that the notion of d-leray complexes cannot distinguish the nerves of collections of convex sets and good covers; however, d- representability is stronger in this respect. That is also why we want to clarify the complexity status of d-collapsibility. A particular example of computational interest. A collection of convex sets in R d has a (p,q)-property with p q d + 1 if among every p sets of the collection there is a subcollection of q sets with a nonempty intersection. The above mentioned (p, q)-theorem of Alon and Kleitman states that for all integers 2 A link of a face σ in a complex K is the complex {η K η σ K,η σ = }. 5

6 p,q,d with p q d+1 there is an integer c such that for every finite collection of convex sets in R d with (p,q)-property there are c points in R d such that every convex set of the collection contains at least one of the selected points. Let c = c (p,q,d) be the minimum possible value of c for which the conclusion of the (p,q)-theorem holds. A significant effort was devoted to estimating c. The first unsolved case regards estimating c (4, 3, 2). The best bounds 3 are due to Kleitman, Gyárfás and Tóth [KGT01]: 3 c (4, 3, 2) 13. It seems that the actual value of c (4, 3, 2) is rather closer to the lower bound in this case, and thus it would be interesting to improve the lower bound even by one. 4 Here 2-collapsibility could come into the play. When looking for a small example one could try to generate all 2-collapsible complexes and check the other properties. Collapsibility in Whitehead s sense. Beside d-collapsibility, collapsibility in Whitehead s sense is much better known (called simply collapsibility). In the case of collapsibility, we allow only to collapse a face σ that is a proper subface of the unique maximal face containing σ. On the other hand, there is no restriction on dimension of σ. Let us mention that one of the important differences between d-collapsibility and collapsibility is that every finite simplicial complex is d-collapsible for d large enough; on the other hand not an every finite simplicial complex is collapsible. Malgouyres and Francés [MF08] proved that it is NP-complete to decide, whether a given 3-dimensional complex collapses to a given 1-dimensional complex. However, their construction does not apply to d-collapsibility. A key ingredient of their construction is that collapsibility distinguishes a Bing s house with thin walls and a Bing s house with a thick wall. However, they are not distinguishable from the point of view of d-collapsibility. They are both 3-collapsible, but none of them is 2-collapsible. Technical issues. Throughout this paper we will use several technical lemmas about d-collapsibility. Since I think that the main ideas of the paper can be followed even without these lemmas I decided to put them separately to Section 5. The reader is encouraged to skip them for the first reading and look at them later for full details. The paper contains many symbols. For the reader s convenience we add a list of often used symbols. It is situated at the end of the paper just above the bibliography. 2 2-collapsibility Here we prove Theorem 1.2(i). 3 Known to the author. 4 Kleitman, Gyárfás and Tóth offer $30 for such an improvement. 6

7 The case d = 1 follows from the fact that d-collapsible complexes coincide with d-leray ones ([LB62, Weg75]). Indeed, let K be a 1-collapsible complex and let σ be its 1-collapsible face. We have that K is 1-Leray, which implies that K σ is 1-Leray (1-collapsing does not affect homology of dimensions 1 and more). This implies that K σ is 1-collapsible, i.e., σ is good. In fact, the case d = 1 can be also solved by a similar (simpler) discussion as the following case d = 2. It remains to consider the case d = 2. Suppose that K is a 2-collapsible complex which, for contradiction, contains a bad 2-collapsible face σ B K. On the other hand, it also contains a good face σ G since it is 2-collapsible. Moreover, we can, without loss of generality, suppose that K is the smallest complex (according to the number of faces) with these properties. Claim 2.1. Let σ be a good face of K and let σ be a 2-collapsible face of K σ. Then σ is a good face of K σ. Proof. The complex K σ is 2-collapsible since σ is a good face of K. If σ were a bad face of K σ, then K σ would be a smaller counterexample to Theorem 1.2(i) contradicting the choice of K. Recall that τ(σ) denotes the unique maximal superface of a collapsible face σ. Two collapsible faces σ and σ are independent if τ(σ) τ(σ ); otherwise, they are dependent. The symbol St(σ, K) denotes the (open) star of a face σ in K, which consists of all superfaces of σ in K (including σ). We remark that St(σ, K) = [σ, τ(σ)] in case that σ is collapsible. Claim 2.2. Let σ,σ K be independent 2-collapsible faces. Then σ is a 2- collapsible face of K σ, σ is a 2-collapsible face of K σ, and (K σ ) σ = (K σ ) σ. Proof. Since τ(σ) τ(σ ), we have σ τ(σ ). Thus, St(σ, K) = St(σ, K σ ), implying that τ(σ) is also a unique maximal face containing σ when considered in K σ. It means that σ is a collapsible face of K σ. Symmetrically, σ is a collapsible face of K σ. Finally, (K σ ) σ = (K σ ) σ = K \ {η K σ η or σ η }. Claim 2.3. Any two 2-collapsible faces of K are dependent. Proof. For contradiction, let σ, σ be two independent 2-collapsible faces in K. First, suppose that one of them is good, say σ, and the second one, i.e., σ, is bad. The face σ is a collapsible face of K σ by Claim 2.2. Thus, (K σ ) σ is 2- collapsible by Claim 2.1. But (K σ ) σ = (K σ ) σ by Claim 2.2, which contradicts the assumption that σ is a bad face. Now suppose that σ and σ are good faces. Then at least one of them is independent of σ B, which yields the contradiction as in the previous case. Similarly, if both of σ and σ are bad faces, then at least one of them is independent of σ G. 7

8 τ σ k η τ k σ B Figure 2: The simplices τ, τ k and η. Due to Claim 2.3 there exists a universal τ K such that τ = τ(σ) for every 2-collapsible σ K. Let us remark that K 2 τ since σ B is a bad face. The following claim represents a key difference among 2-collapsibility and d-collapsibility for d 3. It wouldn t be valid in case of d-collapsibility. Claim 2.4. Let σ be a good face and let σ be a bad face. Then σ σ =. Proof. It is easy to prove the claim in the case that either σ or σ is a 0-face. Let us therefore consider the case that both σ and σ are 1-faces. For contradiction suppose that σ σ, i.e., σ = {u,v}, σ = {v,w} for some mutually different u,v,w τ. Then τ \ {u} is a unique maximal face in K σ that contains σ, so (K σ ) σ exists. Similarly, (K σ ) σ exists and the same argument as in the proof of Claim 2.2 yields (K σ ) σ = (K σ ) σ. Similarly as in the proof of Claim 2.3, (K σ ) σ is 2-collapsible (due to Claim 2.1), but it contradicts the fact that σ is a bad face. The complex K is 2-collapsible. Let K = K 1 K 2 K m = be a 2-collapsing of K, where K i+1 = K i \ [σ i,τ i ]. Clearly, τ 1 = τ. Let k be the minimal integer such that τ k τ. Such k exists since K 2 τ. Moreover, we can assume that all the faces σ 1,...,σ k are edges. This assumption is possible since collapsing a vertex can be substituted by collapsing the edges connected to the vertex and then removing the isolated vertex at the very end of the process. See Lemma 5.2 for details. Claim 2.5. The face σ k is a subset of τ, and it is not a 2-collapsible face of K. Proof. Suppose for contradiction that σ k τ. Then St(σ k, K) = St(σ k, K i ) since only subsets of τ are removed from K during the first i 2-collapses. It implies that σ k is a 2-collapsible face of K contradicting the definition of τ. It is not a 2-collapsible face of K since it is contained in τ and τ k τ. Claim 2.6. The faces σ 1,σ 2,...,σ k 1 are good faces of K. 8

9 Proof. First we observe that each σ i is 2-collapsible face of K for 0 i k 1. If σ i was not 2-collapsible then there is a face ϑ K containing σ i such that ϑ τ. Then ϑ K i due to minimality of k. Consequently τ i cannot be the unique maximal face of K i containing σ i since ϑ contains σ i as well. In order to show that the faces are good we proceed by induction. The face σ 1 is a good face of K since there is a d-collapsing of K starting with σ 1. Now we assume that σ 1,...,σ i 1 are good faces of K for i k 1. If there is an index j < i such that σ j σ i then σ i is good by Claim 2.4. If this is not the case then we set σ 1 = {x,y}. The faces σ i {x} and σ i {y} belong to K i ; however, σ 1 σ i does not belong to K i since σ 1 was collapsed. Thus σ i does not belong to a unique maximal face. Let η = σ k σ B. See Figure 2. Claim 2.5 implies that η τ. By Claim 2.4 (and the fact that σ k is not a good face a consequence of Claim 2.5) the face η does not contain a good face. Thus, η K k by Claim 2.6. In particular η τ k since τ k is a unique maximal face of K k containing σ k, hence σ B τ k. On the other hand, τ is a unique maximal face of K K k containing σ B since σ B is a 2-collapsible face, which implies τ k τ. It is a contradiction that τ k τ. 3 d-collapsible complex with a bad d-collapse In this section we prove Theorem 1.2(ii). We start with describing the intuition behind the construction. Given a full complex K = 2 S (the cardinality of S is 2d), any (d 1)-face is d-collapsible. However, once we collapse one of them, say σ B, the rest (d 1)-faces will be divided into two sets, those which are collapsible in K σb (namely, Σ), and those which are not (namely, Σ). For example, when d = 2, given a tetrahedron, after collapsing one edge, among the rest five edges, four are collapsible and one is not. The idea of the construction is to attach a suitable complex C to K in such a way that the faces of Σ are properly contained in faces of C (and thus they cannot be collapsed until C is collapsed); there is a sequence of d-collapses of some of the faces of Σ such that C can be subsequently d-collapsed. In summary the resulting complex is d-collapsible because of the second requirement. However, if we start with σ B, we get stuck because of the first requirement. 3.1 Bad complex Now, for d 3, we construct a bad complex B, which is d-collapsible but it contains a bad face. A certain important but technical step of the construction 9

10 is still left out. This is to give the more detailed intuition to the reader. Details of that step are given in the subsequent subsections. The complex C glued. Suppose that σ, γ 1,...,γ t are already known (d 1)-dimensional faces of a given complex L. These faces are assumed to be distinct, but not necessarily disjoint. We start with the complex K = 2 σ 2 γ 1 2 γt. We attach a certain complex C to L. The resulting complex is denoted by C glued (σ;γ 1,...,γ t ). Here we leave out the details; however, the properties of C glued are described in the forthcoming lemma (we postpone the proof of this lemma). Lemma 3.1. Let L, L, and C glued = C glued (σ;γ 1,...,γ t ) be the complexes from the previous paragraph. Then we have: (i) If σ is a maximal face of L, then L C glued L \ {σ}. (ii) The only d-collapsible face of C glued is the face σ. (iii) Suppose that d is a constant. Then the number of faces of C glued is O(t). Let S = {p,q 1,...,q d 1,r 1,...,r d } be a 2d-element set. Consider the full simplex 2 S. We name its (d 1)-faces: ι = {p,q 1,...,q d 1 } is an initial face, λ i = {q 1,...,q d 1,r i } are liberation faces for i [d], σ B = {r 1,...,r d }, we will show that σ B is a bad face. The remaining (d 1)-faces are attaching faces; let us denote these faces by α 1,..., α t. We define B by B = 2 S C glued (ι;α 1,...,α t ). See Figure 3 for a schematic drawing. Proof of Theorem 1.2(ii). We want to prove that B is d-collapsible, but it contains a bad d-collapsible face. First, we observe that σ B is a bad face. By Lemma 3.1(ii) and the inspection, the only d-collapsible faces of B are λ i and σ B for i [d]. After collapsing σ B there is no d-collapsible face, implying that σ B is a bad face. In order to show d-collapsibility of B we need a few other definitions. The complex R is defined by R = { σ 2 S if {q 1,...,q d 1 } σ then σ ι }. We observe that R \ {ι} is d-collapsible and also that 2 S R by collapsing all liberation faces (in any order). In fact, the first observation is a special case of Lemma 4.1(ii) used for the NP-reduction. An auxiliary complex A is defined in a similar way to B: 10

11 r 2 α 1 σ B λ 2 p C glued(ι;α 1,α 2 ) α 2 r 1 ι λ 1 q 1 2 S B Figure 3: A schematic drawing of the complexes 2 S and B. A = R C glued (ι;α 1,...,α t ). We show d-collapsibility of B by the following sequence of d-collapses: B A R \ {ι}. The fact that B A is quite obvious it is sufficient to d-collapse the liberation faces. More precisely, we use Lemma 5.3 with K = B, K = 2 S, and L = R. The fact that A R \ {ι} follows from Lemma 3.1(i). We already observed that R \ {ι} when defining R. 3.2 The complex C Our proof relies on constructing d-dimensional d-collapsible complex C such that its first d-collapse is unique. We call this complex a connecting gadget. Precise properties of the connecting gadget are stated in Proposition 3.2. Before stating the proposition we define the notion of distant faces. Suppose that K is a simplicial complex and let u, v be two of its vertices. By dist(u,v) we mean their distance in graph-theoretical sense in the 1-skeleton of K. We say that two faces ω,η K are distant if dist(u,v) 3 for every u ω,v η. Proposition 3.2. Let d 2 and t 0 be integers. There is a d-dimensional complex C = C(ρ;ζ 1,...,ζ t ) with the following properties: (i) It contains (d 1)-dimensional faces ρ,ζ 1,...,ζ t such that each two of them are distant faces. 11

12 F u F u d=2 d=3 Figure 4: The space X. The arrows denote, which facets are identified. (ii) Let C = C (ρ;ζ 1,...,ζ t ) be the subcomplex of C given by C = 2 ρ 2 ζ 1 2 ζt. Then C (C \ {ρ}). In particular, C is d-collapsible since (C \ {ρ}) is d-collapsible. (iii) The only d-collapsible face of C is the face ρ. (iv) Suppose that d is a constant. Then the number of faces of C is O(t). 3.3 The complex C(ρ) We start our construction assuming t = 0; i.e., we construct the connecting gadget C = C(ρ). We remark that the construction of C is in some respects similar to the construction of generalized dunce hats. We refer to [AMS93] for more background. The geometric realization of C(ρ). First, we describe the geometric realization, C, of C. Let P be the d-dimensional crosspolytope, the convex hull conv {e 1, e 1,...,e d, e d } of the vectors of the standard orthonormal basis and their negatives. It has 2 d facets F s = conv {s 1 e 1,...,s d e d }, where s = (s i ) d i=1 { 1, 1} d (s for sign). We want to glue all facets together except the facet F u where u = (1,...,1) (see Figure 4). More precisely, let s { 1, 1} d \{u}. Every x F s can be uniquely written as a convex combination x = x a,s = a 1 s 1 e 1 + +a d s d e d where a = (a i ) d i=1 [0, 1] d and d { i=1 a i = 1. For every } such fixed a we glue together the points in the set x a,s s { 1, 1} d \ {u} ; by X we denote the resulting space. We will construct C in such a way that X is a geometric realization of C. 12

13 e 2 e 2 e 1 { e 1,e 2 } ϑ 0 e 1 0 e 1 { e 1 } e 2 J\2 ϑ { e 2 } Figure 5: The triangulations J (left) and H (right) of P with d = 2. Triangulations of the crosspolytope. We define two auxiliary triangulations of P they are depicted in Figure 5. The simplicial complex J is the simplicial complex with vertex set {0,e 1, e 1,...,e d, e d }. The set of its faces is given by the maximal faces {0,s 1 e 1,s 2 e 2,...,s d e d } where s 1,s 2,...,s d { 1, 1}. The complex J is a triangulation of P. Let ϑ be the face {0,e 1,...,e d }. The complex H is constructed by iterated stellar subdivisions starting with J and subdividing faces of J\2 ϑ (first subdividing d-dimensional faces, then (d 1)-dimensional, etc.). Formally, H is a complex with the vertex set (J \ 2 ϑ ) ϑ and with faces of the form {{σ 1,...,σ k } τ} where σ 1 σ k τ;σ 1,...,σ k J \ 2 ϑ ;τ ϑ;k N 0. The construction of C. Informally, we obtain C from H by the same gluing as was used for constructing X from P. Formally, let be an equivalence relation on (J \ 2 ϑ ) ϑ given by e i { e i } for i [d], σ 1 σ 2 for σ 1,σ 2 J \ 2 ϑ, σ 1 = {s 1 e k1,...,s m e km }, σ 2 = {s 1e k1,...,s me km } where s i,s i { 1, 1} and 1 k 1 < < k m d. For an equivalence relation on a set X we define + to be an equivalence relation on Y 2 X inherited from ; i.e., we have, for Y 1,Y 2 Y, Y 1 + Y 2 if and only if there is a bijection f : Y 1 Y 2 such that f(y) y for every y Y 1. We define C = H/ +. One can prove that C is indeed a simplicial complex and also that C is homeomorphic to X (since the identification C = H/ + was chosen to follow the construction of X). The faces of C are the equivalence classes of +. We use the notation σ for such an equivalence class given by σ H. By ρ we denote the face {e 1,...,e d } of C. 13

14 v 3 =w 3,3t ρ ζ 1 ζ 2 v 1 =w 1,3t v 2 =w 2,3t Figure 6: The complex D(ζ 1,ζ 2 ) (left) and C(ρ;ζ 1,ζ 2 ) (right), here d = The complex C(ρ; ζ 1,...,ζ t ) Now we assume that t 1 and we construct the complex C(ρ;ζ 1,...,ζ t ), which is a refinement of C(ρ). The idea of the construction is quite simple. We pick an interior simplex of C(ρ); and we subdivide it in such a way that we obtain distant (d 1)-dimensional faces ζ 1,...,ζ t (and also distant from ρ). For completeness we show a particular way how to get such a subdivision. A suitable triangulation of a simplex. An example of the following construction is depicted in Figure 6. Let be a d-dimensional (geometric) simplex with a set of vertices V = {v 1,...,v d+1 }, let b be its barycentre, and let t be an integer. Next, we define { W = w i,j w i,j = b + j } 3t (v i b),i [d + 1],j [3t]. Note that V W. For j [t], ζ j is a (d 1)-face {w 1,3j 2,w 2,3j 2,...,w d,3j 2 }. Now we define polyhedra Q 1,...,Q 3t. The polyhedron Q 1 is the convex hull conv {w 1,1...,w d+1,1 }. For j [3t] \ {1} the polyhedron Q j is the union of the convex hulls conv {w k,l k [d + 1] \ {i},l {j 1,j}}. i [d+1] The polyhedron Q 1 is a simplex. For j > 1, the polyhedra Q j are isomorphic to the prisms d [0, 1], where d is a d-simplex. Each such prism admits a (standard) triangulation such that d {0} and d {1} are not subdivided (see [Mat03, Exercise 3, p. 12]). Let D(ζ 1,...,ζ t ) denote an abstract simplicial complex on a vertex set W, which comes from a triangulation of obtained by first subdividing it into 14

15 the polyhedra Q 1,...,Q 3t and subsequently triangulating these polyhedra as described above. The definition of C(ρ; ζ 1,..., ζ t ). Let ξ be a d-face of H such that ξ int H. Although there are multiple such d-faces only some of them are used as ξ. For example, in Figure 6, only one out of four such d-faces is chosen. Suppose that the set V (from above) is the set of vertices of ξ. We define C(ρ;ζ 1,...,ζ t ) = (C(ρ) \ { ξ }) D(ζ 1,...,ζ t ) while recalling that ξ denotes the equivalence class of + from the definition of C. See Figure 6. Proof of Proposition 3.2. The claims (i), (iii) and (iv) follow straightforwardly from the construction. Regarding the claim (ii), informally, we first d-collapse the face ρ; after that we d-collapse the interior of C in order to collapse all d-dimensional faces except the faces that should remain in C \ {ρ}. Formally, we use Lemma 5.4. Gluing. Here we focus on gluing briefly discussed above Lemma 3.1. As the name of connecting gadget suggests, we want to use it (in Section 4) for connecting several other complexes (gadgets). In particular, we want to have some notation for gluing this gadget. We introduce this notation here. Again we suppose that σ, γ 1,...,γ t are already known (d 1)-dimensional faces of a given complex L. They are assumed to be distinct, but not necessarily disjoint. There is a complex K = 2 σ 2 γ 1 2 γt. We take a new copy of C(ρ;ζ 1,...,ζ t ) and we perform identifications ρ = σ, ζ 1 = γ 1,...,ζ t = γ t. After these identifications, the complex K C(ρ;ζ 1,...,ζ t ) is denoted by C glued (σ;γ 1,...,γ t ). Note that C (before gluing) and C glued are generally not isomorphic since the gluing procedure can identify some faces of C. Proof of Lemma 3.1. The first claim follows from Lemma 5.6. The second claim follows from Proposition 3.2(i) and (iii). The last claim follows from Proposition 3.2(iv). 4 NP-completeness Here we prove Theorem 1.1(ii). Throughout this section we assume that d 4 is a fixed integer. We have that d-collapsibility is in NP since if we are given a sequence of faces of dimension at most d 1 we can check in a polynomial time whether this sequence determine a d-collapsing of a given complex. For NP-hardness, we reduce the problem 3-SAT to d-collapsibility. The problem 3-SAT is NP-complete according to Cook [Coo71]. Given a 3-CNF formula Φ, we construct a complex F that is d-collapsible if and only if Φ is satisfiable. 15

16 4.1 Sketch of the reduction Let us recall the construction of the bad complex B. We have started with a simplex 2 S and we distinguished the initial face ι and the bad face σ B. We were allowed to start the collapsing either with σ B or with liberation faces and then with ι. As soon as one of the options was chosen the second one was unavailable. The idea is that these two options should represent an assignment of variables in the formula Φ. A disadvantage is that we cannot continue after collapsing σ B. Thus we rather need to distinguish two initial faces ι + and ι each of them having its own liberation faces. However, we need that these two collections of liberation faces do not interfere. That is why we have to assume d 4. For every variable x j of the formula Φ we thus construct a certain variable gadget V j with two initial faces ι + j and ι j. For a clause Ci in the formula Φ there is a clause gadget G i. Initially it is not possible to collapse clause gadgets. Assume, e.g., that C i contains variables x j and x j in positive occurrence and x j in negative occurrence. Then it is possible to collapse G i as soon as ι + j, ι+ j, or ι j was collapsed. (This is caused by attaching a suitable copy of the connection gadget C from the previous section.) Thus the idea is that the complex F in the reduction is collapsible if and only if all clause gadgets can be simultaneously collapsed which happens if and only if Φ is satisfiable. There are few more details to be supplied. Similarly as for the construction of B we have to attach a copy T of the connecting gadget C to the faces which are neither initial nor liberation (i.e., to attaching faces). This step is necessary for controlling which faces can be collapsed. This copy of connecting gadget is called a tidy connection and once it is activated (at least on of its faces is collapsed) then it is consequently possible to collapse the whole complex F. Finally, there are inserted certain gadgets called merge gadgets. Their purpose is to merge the information obtained by clause gadgets: they can be collapsed after collapsing all clause gadgets and then they activate the tidy connection. The precise definition of F will be described in following subsections. At the moment it can be helpful for the reader to skip few pages and look at Figure 8 (although there is a notation on the picture not introduced yet). 4.2 Simplicial gadgets Now we start supplying the details. As sketched above we introduce several gadgets called simplicial gadgets. They consist of full simplices (on varying number of vertices) with several distinguished (d 1)-faces. These gadgets generalize the complex 2 S. Every simplicial gadget contains one or more (d 1)-dimensional pairwise disjoint initial faces. Every initial face ι contains several (possibly only one) distinguished (d 2)-faces called bases of ι. The liberation faces of the gadget are such (d 1)-faces λ that contain a base of some initial face ι, but λ ι. 16

17 ι ι + ι ι merge one base one base three bases λ merge,1 one base λ merge,2 the variable gadget the clause gadget the merge gadget Figure 7: A schematic pictures of simplicial gadgets; the liberation faces of the merge gadget are distinguished. The remaining (d 1)-faces are attaching faces. Now we define several concrete examples of simplicial gadgets. The variable gadget. The variable gadget V = V(ι +,ι,β +,β ) is described by the following table: vertices: p +,q + 1,...,q + d 1, p,q 1,...,q d 1 ; initial faces: ι + = { p +,q + 1,...,q + d 1}, ι = { p,q 1,...,q d 1} ; bases: β + = { q + 1,...,q + d 1}, β = { q 1,...,q d 1}. The clause gadget. The clause gadget G(ι,λ 1,λ 2,λ 3 ) is given by: vertices: p 1,...,p d,q; initial face: ι = {p 1,p 2,...,p d }; bases: β 1 = ι \ {p 1 }, β 2 = ι \ {p 2 }. β 3 = ι \ {p 3 }. Every base β j is contained in exactly one liberation face λ j = β j {q}. The merge gadget. The merge gadget M(ι merge,λ merge,1,λ merge,2 ) is given by: vertices: p 1,...,p d,q,r; initial face: ι merge = {p 1,p 2,...,p d }; base: ι merge \ {p 1 }. The merge gadget contains exactly two liberation faces, which we denote λ merge,1 and λ merge,2. We close this subsection by proving a lemma about d-collapsings of simplicial gadgets. Lemma 4.1. Suppose that S is a simplicial gadget, ι is its initial face, β ι is a base face, and λ 1,...,λ t are liberation faces containing β. Then d-collapsing of λ 1,...,λ t (even in any order) yields a complex R such that (i) ι is a maximal face of R; (ii) R \ {ι} is d-collapsible; 17

18 (iii) R \ {ι} 2 ι where ι is an initial face different from ι (if exists). Proof. We prove each of the claims separately. (i) Let V be the set of vertices of S and let λ t+1 = ι. We (inductively) observe that d-collapsing of faces λ 1,...,λ k for k t yields a complex in which λ k+1 is contained in a unique maximal face (V \ (λ 1 λ k )) β. This implies that R is well defined and also finishes the first claim since (V \ (λ 1 λ t )) β = ι. We remark that the few details skipped here are exactly the same as in the proof of Lemma 5.1. (ii) We observe that β is a maximal (d 2)-face of R \ {ι} and S β = R \ {ι,β}, hence R \ {ι} S β. (We recall that K σ denotes the resulting complex of an elementary d-collapse K K σ = K \ [σ,τ(σ)].) Next, S β S = by Lemma 5.1. (iii) Similarly as before we have R \ {ι} S β. Let v be a vertex of β, we have S β S {v} by Lemma 5.1. The complex S {v} is a full simplex (S with removed v), this complex even 1-collapse to 2 ι by collapsing vertices of V \ (ι {v}) (in any order). 4.3 The reduction Let the given 3-CNF formula be Φ = C 1 C 2 C n, where each C i is a clause with exactly three literals (we assume without loss of generality that every clause contains three different variables). Suppose that x 1,...,x m are variables appearing in the formula. For every such variable x j we take a fresh copy of the variable gadget and we denote it by V j = V j (ι + j,ι j,β+ j,β j ). For every clause C i containing variables x j1, x j2 and x j3 (in a positive or negative occurrence) we take a new copy of the clause gadget and we denote it by G i = G i (ι i,λ i j 1,λ i j 2,λ i j 3 ). Moreover, for C i with i 2, we also take a new copy of the merge gadget and we denote it M i = M i (ι i merge,λ i merge,1,λ i merge,2). Now we connect these simplicial gadgets by glued copies of the connecting gadget called connections. Suppose that a variable x j occurs positively in the clauses C i 1,...,C i k. We construct the positive occurrence connections by setting O + j = C glued (ι + j ;λi 1 j,...,λ i k j ). The negative occurrence connections O j are constructed similarly (we use ι j instead of ι + j ; and we use clauses in which is x j in negative occurrence). 18

19 The merge connections are defined by I 1 1 = C glued (ι 1 ;λ 2 merge,2); I i 1 = C glued (ι i ;λ i merge,1) where i {2,...,n}; I i 2 = C glued (ι i merge;λ i+1 merge,2) where i {2,...,n 1}. For convenient notation we denote I 1 1 also by I 1 2. Finally, the tidy connection is defined by T = C glued (ι n merge;α 1,...,α t ) where α 1,...,α t are attaching faces of all simplicial gadgets in the reduction, namely the variable gadgets V j for j [m], the clause gadgets G i for i [n], and the merge gadgets M i for i {2,...,n}. The complex F in the reduction is defined by F = m V j j=1 n G i i=1 n m n M i (O + j O j ) I i 1 i=2 j=1 i=1 n 1 i=2 I i 2 T. See Figure 8 for an example. We observe that the number of faces of F is polynomial in the number of clauses in the formula (regarding d as a constant). Indeed, we see that the number of gadgets (simplicial gadgets and connections) is even linear in the number of variables. Each simplicial gadget has a constant size. Each connection has at most linear size due to Lemma 3.1(iii). Collapsibility for satisfiable formulae. We suppose that the formula is satisfiable and we describe a collapsing of F; see Figure 9. We assign each variable TRUE or FALSE so that the formula is satisfied. For every variable gadget V j we proceed as follows. First, suppose that x j is assigned TRUE. We d-collapse 5 the liberation faces containing β + j (see Lemma 4.1(i)), after that ι + j is d-collapsible, and we d-collapse O + j (following Lemma 3.1(i) in the same way as in the proof of Theorem 1.2(ii)). Similarly, we d-collapse O j if x j is assigned FALSE. We use several times Lemma 4.1(i) and Lemma 3.1(i) in the following paragraphs. The use is very similar is in the previous one, thus we do not mention these lemmas again. After d-collapsings described above, we have that every clause gadget G i contains at least one liberation face that is d-collapsible since we have chosen such an assignment that the formula is satisfied. We d-collapse this liberation face and after that the face ι i is d-collapsible. We continue with d-collapsing the merge gadgets I i 1 for i [n]. 5 Note that after d-collapsing a liberation face containing β + j the liberation faces containing β j are no more d-collapsible (and vice versa). This will be a key property for showing that unsatisfiable formulae yield to non-collapsible complexes. 19

20 ι + 1 V 1 ι 1 O + 1 ι 1 G 1 I 1 1=I 1 2 ι + 2 V 2 ι 2 ι + 3 V 3 ι 3 G 2 ι 2 G 3 ι 3 I 2 1 I 3 1 M 2 ι 2 merge I 2 2 M 3 ι 3 merge I 3 2 attaching faces T ι + 4 V 4 ι 4 G 4 ι 4 I 4 1 M 4 ι 4 merge Figure 8: A schematic example of F for the formula Φ = (x 1 x 2 x 3 ) ( x 1 x 2 x 4 ) ( x 1 x 3 x 4 ) (x 2 x 3 x 4 ). Initial faces are drawn as points. (Multi)arrows denote connections. Each (multi)arrow points from the unique d- collapsible face of the connection to simplicial gadgets that are attached to the connection by some of its liberation faces. ι + 1 ι ι 1 2 7: remaining connections(not drawn) ι + 2 ι 2 ι + 3 ι 3 ι + 4 ι ι 2 8 ι 3 8 ι ι 2 merge 8 ι 3 merge 8 ι 4 merge attaching faces 5 Figure 9: d-collapsing of F for the Φ from Figure 8 assigned (FALSE, TRUE, TRUE, FALSE). The numbers denote the order in which the parts of F vanish. 20

21 The next step is that we gradually d-collapse the merge gadgets I i 2 for i {2,...,n 1}. For this, we have that both liberation faces of I 2 2 are d-collapsible, we d-collapse them and we have that ι 2 merge is d-collapsible. We d-collapse I 2 2 and now we continue with the same procedure with I 3 2, the I 4 2, etc. Finally, we d-collapse the tidy gadget. The d-collapsing of tidy gadget makes all the attaching faces of simplicial gadgets d-collapsible. After this tidying up we can d-collapse all variable gadgets (using Lemma 4.1(iii)), then all remaining connections, and at the end all remaining simplicial gadgets due to Lemma 4.1(ii). Non-collapsibility for unsatisfiable formulae. Now we suppose that Φ is unsatisfiable and we prove that F is not d-collapsible. For contradiction, we suppose that F is d-collapsible. Let F = F 1 F 2 be a d-collapsing of F. We call it our d-collapsing. For a technical reason, according to Lemma 5.2, we can assume that first (d 1)-dimensional faces are collapsed and after that faces of less dimensions are removed. Let us fix a subcomplex F l in our d-collapsing. Let N be a connection (one of that forming F) and let N l = F l N. We say that N is activated in F l if N l is a proper subcomplex of N. The connection N is defined as C glued (σ;γ 1,...,γ s ) for some (d 1)-faces σ,γ 1,...,γ s of simplicial gadgets in F. We remark that Lemma 3.1(ii) implies that if N is activated in F l then σ F l. We also prove the following lemma about activated connections. Lemma 4.2. Let F l be a complex from our d-collapsing such that T is not activated in F l. Then we have: (i) Let j [m]. If the positive occurrence connection O + j is activated in F l, then the negative occurrence connection O j is not activated in F l (and vice versa). (ii) Let i [n]. If the merge connection I i 1 is activated in F l, then at least one of the three occurrence connections attached to G i is activated in F l. (iii) Let i {2,...,n 1}. If the merge connection I i 2 is activated in F l, then the merge connections I i 1 and I i 1 2 are activated in F l. Proof. Let us consider first l 1 d-collapses of our d-collapsing F = F 1 F 2 F l, where F k+1 = F k \ [σ k,τ k ] for k [l 1]. According to assumption on our d-collapsing, we have that σ 1,...,σ l 1 are (d 1)-dimensional (since T is not activated in F l yet). Now we prove each of the claims separately. 21

22 (i) For a contradiction we suppose that both O + j and O j are activated in F l. We consider the variable gadget V j. We say that an index k [l 1] is relevant if σ k V j. We observe that if k is a relevant index then σ k is a liberation face or an initial face of V j, because attaching faces are contained in T. By positive face we mean either the initial face ι + j or a liberation face containing β + j. A negative face is defined similarly. Let k+ (respectively k ) be the smallest relevant index such that σ k + is a positive face (respectively negative face). These indexes have to exist since both O + j and O j are activated in F l. Without loss of generality k + < k. We show that σ k is not a d-collapsible face of F k 1, thus we get a contradiction. Indeed, let S = σ k + \ σ k. We have S 2 since d 4 (here we crucially use this assumption). Let s S. Then we have σ k {s} F k 1, because σ k {s} does not contain a positive subface (it does not contain β + j since σ k β + j 1, but β+ j 3). On the other hand σ k S K k 1 since it contains σ k +. I.e., σ k is not in a unique maximal face. (ii) We again define a relevant index; this time k [l 1] is relevant if σ k G i. We consider the smallest relevant index k. Again we have that σ k is either the initial face ι i or a liberation face of G i. In fact, σ k cannot be ι i : by Lemma 3.1(ii) we would have that I i 1 F k 1 and also G i F k 1 from minimality of k, which would contradict that σ k is a collapsible face of F k 1. Thus σ k is a liberation face of G i. This implies, again by Lemma 3.1(ii), that at least one of the occurrence gadgets attached to liberation faces is activated even in F k 1. (iii) By a similar discussion as in previous step we have that at least one of the liberation faces λ i merge,1 and λ i merge,2 of M i have to be d-collapsed before d-collapsing ι i merge. However, we observe that d-collapsing only one of these faces is still insufficient for possibility of d-collapsing ι i merge. Hence both of the liberation faces have to be d-collapsed, which implies that both the gadgets I i 1 and I i 1 2 are activated in F l. We also prove an analogy of Lemma 4.2 for the tidy gadget. We have to modify the assumptions, that is why we use a separate lemma. The proof is essentially same as the proof of Lemma 4.2(iii), therefore we omit it. Lemma 4.3. Let l be the largest index such that T is not activated in F l, then the merge connections I n 1 and I n 1 2 are activated in F l. 22

23 Now we can quickly finish the proof of non-collapsibility. Let l be the integer from Lemma 4.3. By this lemma and repeatedly using Lemma 4.2(iii) we have that all merge connections are activated in F l. By Lemma 4.2(ii), for every clause gadget G i there is an occurrence gadget attached to G i, which is activated in F l. Finally, Lemma 4.2(i) implies that for every variable x j at most one of the occurrence gadgets O + j, O j is activated in F l. Let us assign x j TRUE if it is O + j and FALSE otherwise. This is satisfying assignment since for every G i at least one occurrence gadget attached to it is activated in F l. This contradicts the fact that Φ is unsatisfiable. 5 Technical properties of d-collapsing In this section, we prove several auxiliary lemmas on d-collapsibility used throughout the paper. 5.1 d-collapsing faces of dimension strictly less than d 1 Lemma 5.1. Let K be a complex, d an integer, and σ a d-collapsible face (in particular, dimσ d 1). Let σ σ be a face of K of dimension at most d 1. Then σ is d-collapsible and K σ K σ. Proof. We assume that σ σ otherwise the proof is trivial. First, we observe that τ(σ) is a unique maximal face containing σ. Indeed, σ τ(σ) since τ(σ) is the unique maximal face containing σ, and also if η σ, then η σ, which implies η τ(σ). Hence we have that σ is d-collapsible. Let v 1 be a vertex of σ \ σ. It is sufficient to prove that K σ K σ \{v 1 } and proceed by induction. Thus, for simplicity of notation, we can assume that σ = σ {v 1 }. Let v 2,...,v t be vertices of τ(σ) \ σ. By η i we denote the face σ {v i } for i [t]. (In particular, σ = η 1.) For i [t + 1] we define a complex K i by the formula K i = {η K η η 1,...,η η i 1 } = {η K if η σ then v j η for j < i}. From these descriptions we have that η i is a d-collapsible face of K i contained in a unique maximal face τ i = τ(σ) \ {v 1,...,v i 1 }. Moreover (K i ) ηi = K i+1. Thus, we have a d-collapsing K = K 1 K 2 K t+1. See Figure 10 for an example. To finish the proof it remains to observe that K 2 = K σ union of K σ and {σ}, hence K t+1 K σ. and K t+1 is a disjoint 23

24 v 2 v 3 σ σ v 1 K 1 =K K 2 =K σ K 3 K 4 K σ Figure 10: An example of 2-collapsing K K σ K σ. As a corollary, we obtain the following lemma. Lemma 5.2. Suppose that K is a d-collapsible complex. Then there is a d- collapsing of K such that first only (d 1)-dimensional faces are collapsed and after that faces of dimensions less then (d 1) are removed. Proof. Suppose that we are given a d-collapsing of K. Suppose that in some step we d-collapse a face σ that is not maximal and its dimension is less than d 1. Let us denote this step by K K σ. Let σ σ be such a face of K that either dimσ = d 1 or σ is a maximal face. Then we replace this step by d-collapsing K K σ K σ. We repeat this procedure until every d-collapsed face is either of dimension d 1 or maximal. We observe that this procedure can be repeated only finitely many times since in every replacement we increase the number of elementary d-collapses in the d-collapsing, while this number is bounded by the number of faces of K. Finally, we observe that if we first remove a maximal face of dimension less than d 1 and then we d-collapse a (d 1)-dimensional face, we can swap these steps with the same result. 5.2 d-collapsing to a subcomplex Suppose that K is a simplicial complex, K is a subcomplex of it, which d-collapses to a subcomplex L. If certain conditions are satisfied, then we can perform d- collapsing K L in whole K; see Figure 11 for an illustration. The precise statement is given in the following lemma. Lemma 5.3 (d-collapsing a subcomplex). Let K be a simplicial complex, K a subcomplex of K, and L a subcomplex of K. Assume that if σ K \ L, η K, and η σ, then η K \L. Moreover assume that K L. Then L = (K\K ) L is a simplicial complex and K L. Proof. It is straightforward to check that L is a simplicial complex using the equivalence 24

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

4: SINGLE-PERIOD MARKET MODELS

4: SINGLE-PERIOD MARKET MODELS 4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

On the h-vector of a Lattice Path Matroid

On the h-vector of a Lattice Path Matroid On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:

More information

3 The Model Existence Theorem

3 The Model Existence Theorem 3 The Model Existence Theorem Although we don t have compactness or a useful Completeness Theorem, Henkinstyle arguments can still be used in some contexts to build models. In this section we describe

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and

More information

Revenue Management Under the Markov Chain Choice Model

Revenue Management Under the Markov Chain Choice Model Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in a society. In order to do so, we can target individuals,

More information

3 Arbitrage pricing theory in discrete time.

3 Arbitrage pricing theory in discrete time. 3 Arbitrage pricing theory in discrete time. Orientation. In the examples studied in Chapter 1, we worked with a single period model and Gaussian returns; in this Chapter, we shall drop these assumptions

More information

Characterization of the Optimum

Characterization of the Optimum ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA

PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA We begin by describing the problem at hand which motivates our results. Suppose that we have n financial instruments at hand,

More information

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Levin Reduction and Parsimonious Reductions

Levin Reduction and Parsimonious Reductions Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded) 3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models MATH 5510 Mathematical Models of Financial Derivatives Topic 1 Risk neutral pricing principles under single-period securities models 1.1 Law of one price and Arrow securities 1.2 No-arbitrage theory and

More information

10.1 Elimination of strictly dominated strategies

10.1 Elimination of strictly dominated strategies Chapter 10 Elimination by Mixed Strategies The notions of dominance apply in particular to mixed extensions of finite strategic games. But we can also consider dominance of a pure strategy by a mixed strategy.

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Subgame Perfect Cooperation in an Extensive Game

Subgame Perfect Cooperation in an Extensive Game Subgame Perfect Cooperation in an Extensive Game Parkash Chander * and Myrna Wooders May 1, 2011 Abstract We propose a new concept of core for games in extensive form and label it the γ-core of an extensive

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Two-Dimensional Bayesian Persuasion

Two-Dimensional Bayesian Persuasion Two-Dimensional Bayesian Persuasion Davit Khantadze September 30, 017 Abstract We are interested in optimal signals for the sender when the decision maker (receiver) has to make two separate decisions.

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

In Discrete Time a Local Martingale is a Martingale under an Equivalent Probability Measure

In Discrete Time a Local Martingale is a Martingale under an Equivalent Probability Measure In Discrete Time a Local Martingale is a Martingale under an Equivalent Probability Measure Yuri Kabanov 1,2 1 Laboratoire de Mathématiques, Université de Franche-Comté, 16 Route de Gray, 253 Besançon,

More information

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015 Best-Reply Sets Jonathan Weinstein Washington University in St. Louis This version: May 2015 Introduction The best-reply correspondence of a game the mapping from beliefs over one s opponents actions to

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

monotone circuit value

monotone circuit value monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.

More information

You Have an NP-Complete Problem (for Your Thesis)

You Have an NP-Complete Problem (for Your Thesis) You Have an NP-Complete Problem (for Your Thesis) From Propositions 27 (p. 242) and Proposition 30 (p. 245), it is the least likely to be in P. Your options are: Approximations. Special cases. Average

More information

Extender based forcings, fresh sets and Aronszajn trees

Extender based forcings, fresh sets and Aronszajn trees Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Maximum Contiguous Subsequences

Maximum Contiguous Subsequences Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these

More information

Option Pricing. Chapter Discrete Time

Option Pricing. Chapter Discrete Time Chapter 7 Option Pricing 7.1 Discrete Time In the next section we will discuss the Black Scholes formula. To prepare for that, we will consider the much simpler problem of pricing options when there are

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Cook s Theorem: the First NP-Complete Problem

Cook s Theorem: the First NP-Complete Problem Cook s Theorem: the First NP-Complete Problem Theorem 37 (Cook (1971)) sat is NP-complete. sat NP (p. 113). circuit sat reduces to sat (p. 284). Now we only need to show that all languages in NP can be

More information

4 Martingales in Discrete-Time

4 Martingales in Discrete-Time 4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

Best response cycles in perfect information games

Best response cycles in perfect information games P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski

More information

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis Seller has n items for sale The Set-up Seller has n items

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,

More information

Another Variant of 3sat

Another Variant of 3sat Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

GPD-POT and GEV block maxima

GPD-POT and GEV block maxima Chapter 3 GPD-POT and GEV block maxima This chapter is devoted to the relation between POT models and Block Maxima (BM). We only consider the classical frameworks where POT excesses are assumed to be GPD,

More information

Lecture 7: Bayesian approach to MAB - Gittins index

Lecture 7: Bayesian approach to MAB - Gittins index Advanced Topics in Machine Learning and Algorithmic Game Theory Lecture 7: Bayesian approach to MAB - Gittins index Lecturer: Yishay Mansour Scribe: Mariano Schain 7.1 Introduction In the Bayesian approach

More information

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59 SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)

More information

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography. SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem

More information

Generalising the weak compactness of ω

Generalising the weak compactness of ω Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak

More information

Unary PCF is Decidable

Unary PCF is Decidable Unary PCF is Decidable Ralph Loader Merton College, Oxford November 1995, revised October 1996 and September 1997. Abstract We show that unary PCF, a very small fragment of Plotkin s PCF [?], has a decidable

More information

Level by Level Inequivalence, Strong Compactness, and GCH

Level by Level Inequivalence, Strong Compactness, and GCH Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL) Part 3: Trust-region methods for unconstrained optimization Nick Gould (RAL) minimize x IR n f(x) MSc course on nonlinear optimization UNCONSTRAINED MINIMIZATION minimize x IR n f(x) where the objective

More information

Lecture 19: March 20

Lecture 19: March 20 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 19: March 0 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

Mixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009

Mixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009 Mixed Strategies Samuel Alizon and Daniel Cownden February 4, 009 1 What are Mixed Strategies In the previous sections we have looked at games where players face uncertainty, and concluded that they choose

More information

2 Modeling Credit Risk

2 Modeling Credit Risk 2 Modeling Credit Risk In this chapter we present some simple approaches to measure credit risk. We start in Section 2.1 with a short overview of the standardized approach of the Basel framework for banking

More information

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d) The Traveling Salesman Problem We are given n cities 1, 2,..., n and integer distances d ij between any two cities i and j. Assume d ij = d ji for convenience. The traveling salesman problem (tsp) asks

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

1 Appendix A: Definition of equilibrium

1 Appendix A: Definition of equilibrium Online Appendix to Partnerships versus Corporations: Moral Hazard, Sorting and Ownership Structure Ayca Kaya and Galina Vereshchagina Appendix A formally defines an equilibrium in our model, Appendix B

More information

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus

Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus University of Cambridge 2017 MPhil ACS / CST Part III Category Theory and Logic (L108) Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus Andrew Pitts Notation: comma-separated

More information

Variations on a theme by Weetman

Variations on a theme by Weetman Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs

More information

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

The finite lattice representation problem and intervals in subgroup lattices of finite groups

The finite lattice representation problem and intervals in subgroup lattices of finite groups The finite lattice representation problem and intervals in subgroup lattices of finite groups William DeMeo Math 613: Group Theory 15 December 2009 Abstract A well-known result of universal algebra states:

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

A Translation of Intersection and Union Types

A Translation of Intersection and Union Types A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba

More information

A class of coherent risk measures based on one-sided moments

A class of coherent risk measures based on one-sided moments A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES

THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES FU LIU AND BRIAN OSSERMAN Abstract. We study pure-cycle Hurwitz spaces, parametrizing covers of the projective line having only one ramified point

More information

Fractional Graphs. Figure 1

Fractional Graphs. Figure 1 Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

Silver type theorems for collapses.

Silver type theorems for collapses. Silver type theorems for collapses. Moti Gitik May 19, 2014 The classical theorem of Silver states that GCH cannot break for the first time over a singular cardinal of uncountable cofinality. On the other

More information

Cumulants and triangles in Erdős-Rényi random graphs

Cumulants and triangles in Erdős-Rényi random graphs Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability

More information

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York

More information

A No-Arbitrage Theorem for Uncertain Stock Model

A No-Arbitrage Theorem for Uncertain Stock Model Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe

More information

DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH

DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH Abstract. Suppose D is an ultrafilter on κ and λ κ = λ. We prove that if B i is a Boolean algebra for every i < κ and λ bounds the Depth of every

More information

Assortment Optimization Over Time

Assortment Optimization Over Time Assortment Optimization Over Time James M. Davis Huseyin Topaloglu David P. Williamson Abstract In this note, we introduce the problem of assortment optimization over time. In this problem, we have a sequence

More information

Trust Region Methods for Unconstrained Optimisation

Trust Region Methods for Unconstrained Optimisation Trust Region Methods for Unconstrained Optimisation Lecture 9, Numerical Linear Algebra and Optimisation Oxford University Computing Laboratory, MT 2007 Dr Raphael Hauser (hauser@comlab.ox.ac.uk) The Trust

More information

Equilibrium payoffs in finite games

Equilibrium payoffs in finite games Equilibrium payoffs in finite games Ehud Lehrer, Eilon Solan, Yannick Viossat To cite this version: Ehud Lehrer, Eilon Solan, Yannick Viossat. Equilibrium payoffs in finite games. Journal of Mathematical

More information

Philipp Moritz Lücke

Philipp Moritz Lücke Σ 1 -partition properties Philipp Moritz Lücke Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/ Logic & Set Theory Seminar Bristol, 14.02.2017

More information

arxiv: v2 [math.lo] 13 Feb 2014

arxiv: v2 [math.lo] 13 Feb 2014 A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the

More information

MTH6154 Financial Mathematics I Interest Rates and Present Value Analysis

MTH6154 Financial Mathematics I Interest Rates and Present Value Analysis 16 MTH6154 Financial Mathematics I Interest Rates and Present Value Analysis Contents 2 Interest Rates and Present Value Analysis 16 2.1 Definitions.................................... 16 2.1.1 Rate of

More information

The Value of Information in Central-Place Foraging. Research Report

The Value of Information in Central-Place Foraging. Research Report The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different

More information